Alan's Bookmarks
Alan's Bookmarks
Tag cloud
Picture wall
Daily
RSS Feed
Login
Remember me
Picture Wall - 82 pics
County pays $600,000 to pentesters it arrested for assessing courthouse security - Ars Technica
So, You’ve Hit an Age Gate. What Now? | Electronic Frontier Foundation
Surrender as a service: Microsoft unlocks BitLocker for feds • The Register
Claude Cowork Exfiltrates Files
Hong Kong uses brick-and-mortar banks to stop scams • The Register
Death to one-time text codes: Passkeys are the new hotness • The Register
Manufacturer issues remote kill command to disable smart vacuum after engineer blocks it from collecting data — user revives it with custom hardware and Python scripts to run offline | Tom's Hardware
10M people watched a YouTuber shim a lock; the lock company sued him. Bad idea. - Ars Technica
How I Almost Got Hacked By A 'Job Interview'
Study reveals satellites comms spilling unencrypted data • The Register
Why Signal’s post-quantum makeover is an amazing engineering achievement - Ars Technica
The number of mis-issued 1.1.1.1 certificates grows. Here’s the latest. - Ars Technica
Epoch-alypse now: BBC iPlayer flaunts 2038 cutoff date • The Register
The Unix Epochalypse might be sooner than you think • The Register
I started losing my digital privacy in 1974, aged 11 • The Register
Ex-White House cyber guru talks Microsoft security fails • The Register
Why blow up satellites when you can just hack them? • The Register
Open source's superior security is a matter of eyeballs • The Register
Weak password allowed hackers to sink a 158-year-old company
Security vulnerability on U.S. trains that let anyone activate the brakes on the rear car was known for 13 years — operators refused to fix the issue until now | Tom's Hardware
Actively exploited vulnerability gives extraordinary control over server fleets - Ars Technica
WhatsApp provides no cryptographic management for group messages - Ars Technica
WhatsApp provides no cryptographic management for group messages - Ars Technica
Delete Any Texts On Your Phone That Include These Messages
johnshearing/PrivateKeyVault: Make Instructions: Airgapped raspberry pi computer for working with blockchains featuring LUKS full disk encryption and using qr-codes to pass encrypted files and offline transaction instructions across the airgap.
Windows Remote Desktop Protocol contains a login backdoor Microsoft refuses to fix | TechSpot
iOS and Android juice jacking defenses have been trivial to bypass for years - Ars Technica
0patch Explained: How It Works and What It Means for the End of Windows 10 | PCMag
Microsoft mystery folder fix might need a fix of its own • The Register
IP/DNS Detect - What is your IP, what is your DNS, what informations you send to websites.
We Need to Talk About Jeffrey Goldberg Accidently Being Added to a National Security Chat – RedState
CIA Director John Ratcliffe Swats Down Signal Story in Senate Intel Hearing – RedState
UK quietly scrubs encryption advice from government websites | TechCrunch
How North Korea pulled off a $1.5 billion crypto heist—the biggest in history - Ars Technica
What is device code phishing, and why are Russian spies so successful at it? - Ars Technica
DOGE’s .gov site lampooned as coders quickly realize it can be edited by anyone - Ars Technica
Did Tulsi Gabbard's Senate Testimony Hurt Her Confirmation Chances? – RedState
Stop Changing Your (Strong, Unique) Passwords So Much | PCMag
8 precautions you need to take when discarding your old hard disk
Backdoor found in two healthcare patient monitors, linked to IP in China
Startup necromancy: Dead Google Apps domains can be compromised by new owners - Ars Technica
Encryption backdoor debate 'done and dusted' • The Register
US mulls TP-Link routers ban on national security concerns • The Register
FBI Warns iPhone, Android Users—Change WhatsApp, Facebook Messenger, Signal Apps
Federal agency warns critical Linux vulnerability being actively exploited - Ars Technica
Your AI clone could target your family, but there’s a simple defense - Ars Technica
New website shows you how much Google AI can learn from your photos - Ars Technica
US recommends encrypted messaging as Chinese hackers linger in telecom networks - Ars Technica
Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack | WIRED
CO Secretary Of State Posts Voting Passwords Online
Internet Archive breached again through stolen access tokens
How Cloudflare auto-mitigated world record 3.8 Tbps DDoS attack
SQL injection bug allows anyone to skip airport security • The Register
Is Telegram really an encrypted messaging app? – A Few Thoughts on Cryptographic Engineering
NextDNS - The new firewall for the modern Internet
Chrome, Firefox, Safari patch 0.0.0.0 security hole • The Register
California DMV Puts 42 million Car Titles on Blockchain
97% of CrowdStrike systems are back online; Microsoft suggests Windows changes | Ars Technica
Search in SHA-1 (v1.1)
Security Engineering Lecture 1: Who is the Opponent? - Ross Anderson and Sam Ainsworth - YouTube
Linux maintainers were infected for 2 years by SSH-dwelling backdoor with huge reach | Ars Technica
Novel attack against virtually all VPN apps neuters their entire purpose | Ars Technica
Meta and Lavender
Attackers are pummeling networks around the world with millions of login attempts | Ars Technica
Change Healthcare faces another ransomware threat—and it looks credible | Ars Technica
“Highly capable” hackers root corporate networks by exploiting firewall 0-day | Ars Technica
What we know about the xz Utils backdoor that almost infected the world | Ars Technica
Backdoor found in widely used Linux utility breaks encrypted SSH connections | Ars Technica
Truck-to-truck worm could infect – and disrupt – entire US commercial fleet • The Register
Law enforcement doesn’t want to be “customer service” reps for Meta any more | Ars Technica
Critical vulnerability affecting most Linux distros allows for bootkits | Ars Technica
Hackers can infect network-connected wrenches to install ransomware | Ars Technica
Hackers can infect network-connected wrenches to install ransomware | Ars Technica
Gmail 2024 Hack Attack Advice: Turn It Off And On Again, Google Says
Millions still haven’t patched Terrapin SSH protocol vulnerability | Ars Technica
How do passkeys work? | Bitwarden Blog
SSH protects the world’s most sensitive networks. It just got a lot weaker | Ars Technica
Trains were designed to break down after third-party repairs, hackers find | Ars Technica
In Fail2Ban, How to Change the SSH port number? - Server Fault
2 municipal water facilities report falling to hackers in separate breaches | Ars Technica
In a first, cryptographic keys protecting SSH connections stolen in new attack | Ars Technica
No, Okta, senior management, not an errant employee, caused you to get hacked | Ars Technica
Fold
Fold all
Expand
Expand all
Are you sure you want to delete this link?
Are you sure you want to delete this tag?
The personal, minimalist, super fast, database-free, bookmarking service by the Shaarli community